Tomcat (8080)

Discovery

http://app-dev.inlanefreight.local:8080/invalid

Interesting Files

WEB-INF/web.xml

tomcat-users.xml

Enumeration

Wordlists

Password

tomcat::Tomcatadm

Tomcat Manager - Login Brute Force

mgr_brute.py

Tomcat Manager - WAR File Upload

Manually

jsp shell: https://raw.githubusercontent.com/tennc/webshell/master/fuzzdb-webshell/jsp/cmd.jsp

Browse to select the .war file and then click on Deploy.

Msfvenom

Metasploit

multi/http/tomcat_mgr_upload

Exploitation

Web Shell

CVE-2025-24813 Apache Tomcat RCE

  • Apache Tomcat 11.0.0-M1 to 11.0.2

  • Apache Tomcat 10.1.0-M1 to 10.1.34

  • Apache Tomcat 9.0.0.M1 to 9.0.98

Upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.

or with Curl

CVE-2024-50379 - RCE

Time-of-Check Time-of-Use (TOCTOU) race condition that can lead to remote code execution (RCE) if the server's configuration allows writable directories.

Upload a JSP shell to a vulnerable server and execute commands remotely.

CVE-2024-52316 - Authentification Bypass

Version Series
Affected Versions

Apache Tomcat 11.0

Versions prior to 11.0.0

Apache Tomcat 10.1

Versions prior to 10.1.31

Apache Tomcat 9.0

Versions prior to 9.0.96

CVE-2024-40725 and CVE-2024-40898 - SSRF

Apache HTTP Server versions 2.4.0 through 2.4.61

CVE-2024-52318 - XSS

Apache Tomcat 11.0 Versions prior to 11.0.1 Apache Tomcat 10.1 Versions prior to 10.1.33 Apache Tomcat 9.0 Versions prior to 9.0.97

CVE-2024-52317 - Data Leakage

Apache Tomcat 11.0 Versions prior to 11.0.0 Apache Tomcat 10.1 Versions prior to 10.1.31 Apache Tomcat 9.0 Versions prior to 9.0.96

Ghostcat

python3 exploit:

Log4Shell

Spring4Shell

Tomcat CGI

Tomcat CGI

Tools

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Resources

Last updated